information security management 中文意思是什麼

information security management 解釋
信息安全管理
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • management : n. 1. 辦理,處理;管理,經營;經營力,經營手腕。2. 安排;妥善對待。3. 〈the management〉〈集合詞〉(工商企業)管理部門;董事會;廠方,資方。
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. The security management of information system is a dynamic circulatory evolutive process

    信息系統的安全管理工作是一個動態循環演化的過程。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. Some experience of intranet information security management

    內網安全解決方案經驗談
  5. In the age of information, security system does not mean a simple pure protection, but the great rivalship between the security officers ( so ) and virtual attackers ( va ). some cyberspace security systems only give the defense framework, which is the integration of different protection technologies based on the system security management requirements, but not based on the understanding of information rivalry

    在信息技術高速發展的時代,網路安全已不再是單純的防禦技術,而越來越成為安全管理員( securityofficers , so )與虛擬攻擊者( virtualattackers , va )之間信息與知識的對抗。
  6. Koal software, which is approved by the state secrets bureau, is one of the first qualification corporations on computer information system integration related to national secrets. koal software, a pilot unit of computer network security services authentication by the computer network and information security administrtion office, has an experienced team for information system integrated security construction and services management and implementation. to users, it is a reliable long - time system security provider

    格爾軟體是國家保密局批準的首批「涉及國家秘密的計算機信息系統集成」資質單位,是國信安辦認定的首批計算機網路安全服務試點單位,擁有一支經驗豐富的信息系統整體安全建設與安全服務的項目管理與實施隊伍,是用戶信息系統能夠得到長久安全保障的可信賴的信息安全服務商。
  7. It is designed to provide the administrative body of an organization with a set of essential elements of information security management. it also provides a common language and a system framework of information resource protection, comprehensible and acceptable to both information specialists and high level management. in addition, the paper puts forward on the basis of detailed analysis a platform for the implementation of information security management

    本文作者針對國內信息系統安全管理的普遍性問題和海關信息系統安全管理中的具體實踐,較為系統地對信息系統安全管理的體系框架進行了研究,旨在給管理層一整套可裁剪的信息安全管理要素及「量體裁衣」的原則和方法、一套與管理高層進行溝通的共同語言以及保護信息資產的制度框架,是管理高層能夠接受並理解的,從而克服管理層和it應用層在信息系統安全方案規劃、實施和系統維護等方面的認識局限性,有利於達成信息系統安全保障體系的共識。
  8. This paper focus on the application of the information security management standard - bs7799 to information security risk assessment and a whole set of designing scheme is provided, which is finally implemented in software form

    本文重點研究如何將信息安全管理標準bs7799應用到信息安全風險評估中,提供了整套的設計方案,並最終用軟體實現。
  9. We lead by example, and uphold very high standards of security and data protection through our information security management framework. we make exemplary use of cryptographic technologies to facilitate secure communication among government users of it and with the general public

    在政府新一輪的電子政府策略中,我們將利用資訊科技提供以客為本的服務,讓市民得享更簡便易用的公共服務。
  10. Firstly, it introduces the information security theories and technologies used in the study. the information security theories mainly includes ppdr - the dynamic security model, sse - cmm, padminee - the life cycle of information security engineering model, bs7799 - the standard of information security management, the grade - classification standard of information system security protection, iatf - the technical framework of information security guarantee and the principle of wooden pail etc. and the information security technologies consist of the technology of firewall, invasion detection, virus prevention and cure, loophole scanning, the identity certification and the soc etc. then it studies on the designing of the information security guarantee system

    首先,介紹和分析與本研究相關的主要信息安全理論與技術,其中信息安全理論有ppdr動態安全模型、 sse - cmm系統安全工程-能力成熟度模型、 padminee信息安全生命周期工程模型、 bs7799信息安全管理標準、信息系統安全保護等級劃分準則、 iatf信息安全保障技術框架和木桶安全理論等;信息安全技術有防火墻技術、入侵檢測技術、計算機病毒防治技術、漏洞掃描與評估技術、身份認證技術和soc技術等。
  11. This article embarked from the domestic and foreign related information security management present situation, elaborates the importance and the urgency of strengthen the army colleges and universities information security management ; has studied the information security management elementary theory, the system, the standard and the appraisal method ; embarks from the army colleges and universities actual situation, the analysis current information security management existence main question, and the sample investigation method, has studied the influence information security management primary factor, proposed strengthens the army colleges and universities information security management the countermeasure suggestion

    本文從國內外有關信息安全管理的現狀出發,論述了加強軍隊院校信息安全管理的重要性和緊迫性;研究了信息安全管理的基本理論、體系、標準和評價方法;從軍隊院校的實際情況出發,分析當前信息安全管理存在的主要問題,並以抽樣調查的方法,研究了影響信息安全管理的主要因素,提出了加強軍隊院校信息安全管理的對策建議。
  12. Information security management in internet

    網路環境下的信息安全管理
  13. E - government information security management through pki system

    體系下進行電子政務信息的安全管理
  14. Information technology - code of practice for information security management

    信息技術信息安全管理實用規則
  15. The bs7799 certificate for international information security management system

    國際資訊安全管理系統bs7799認證證書
  16. Isms ? are you ready for a bs iso iec 27001 information security management systems audit

    是否準備好bs iso iec 27001信息安全管理系統
  17. Information technology - security techniques - code of practice for information security management

    信息技術.安全技術.信息安全管理的實施規范
  18. Information technology - security techniques - information security management systems - requirements

    信息技術.安全技術.信息安全管理系統.要求
  19. To develop and maintain the information security management framework within the office of the gcio

    ( e )開發並持續管理政府資訊科技總監辦公室內的資訊保安管理架構。
  20. Twds computerized water quality monitoring system leads the world water utilities in obtaining the bs7799 certificate for the international information security management system. the excellent management at the zhitan purification plant also won approval from the water resources agency, ministry of economic affairs

    本處水質電腦監測系統亦領先全球自來水業,率先取得國際資訊安全管理系統bs7799認證資格直潭凈水場管理卓越,榮獲經濟部水利署頒獎表揚。
分享友人